General

  • Target

    18022025_1613_17022025_Proforma invoice22025.zip

  • Size

    537KB

  • Sample

    250218-tpecbstjd1

  • MD5

    8a6cad105559c7bb68e061eef6543894

  • SHA1

    728176b1100fac9e54b91a13adab498d21f39464

  • SHA256

    76c6d22f002d515984ff4c63d83695cec04b900fe396daecad771fcbf95c9e08

  • SHA512

    3b6e1baa990d3aa9f2582d62e73b33a8126607612599456805642d757ffa854462ffdf47eedc2c27548247db43afe8d2d1d3a221cb317cfb3e00ac027b517604

  • SSDEEP

    12288:RbkbBgslNyrG8gm7jn6mGTXV0eqCfqtQjEO19nfyDWlDTqkj:sBpNyPjjWV1qCfKOHfy2D3j

Malware Config

Extracted

Family

snakekeylogger

Credentials

Targets

    • Target

      Proforma invoice22025.exe

    • Size

      629KB

    • MD5

      e353450fb834d5ac12d7f3786944cc90

    • SHA1

      df7676c8eb50080c48d496834a781ec3d6b7d700

    • SHA256

      4a52966dbc301aea30bd705c459d57b927a5acda0691cde6630625a0ed7f42fd

    • SHA512

      d75d502ad69972b23e81b35486e67c7f6bfe06c9fa2cd4dcb6a377c7862da0bb3760d561b4d512809a836af30a33df75afab5f962b0adce2f0ab1502a55693d5

    • SSDEEP

      12288:Dxgm2GjY167dv4mGttj0KqCJ+tQdEafw99zmJWeh4B48eF+9kR:VtY1sdgjLqCJ4aYPzmvGheN

    • Snake Keylogger

      Keylogger and Infostealer first seen in November 2020.

    • Snake Keylogger payload

    • Snakekeylogger family

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Accesses Microsoft Outlook profiles

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks